Alexander Gall (gall) writes:
> > But why would a hardware implementation be better than, for instance, 
> > SoftHSM?
> 
> A hardware HSM allows you to detect when your keys get stolen
> (provided the hardware does not implement extraction of the keys, of
> course).  In our case, this is the *only* reason we use a HSM at all.

        Does HSM imply tamper-proof ? If so, then yes, otherwise, you could very
        well embed a small Atom device running SoftHSM with a smart card reader
        for key import/export, drown the entire thing in epoxy, package the 
thing
        in a tamper proof cabinet, and you've got an HSM.

        I think the main idea with doing it with an FPGA is: speed, power
        consumption, reduced size. That makes it easier to audit, easier to
        protect. But arguably this could all be done with a Raspberry Pi as
        well, if you're not in a hurry.

        Phil
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to